9 Scientific, measuring, signalling and checking (supervision) apparatus and instruments; Apparatus for recording, transmission or reproduction of computer data, sound or images; Apparatus for the collection, storage, encryption, measuring, processing, verification, conversion, switching, transfer, reproduction and transmission of data; electronic and computer databases; Electronic databases and computer databases; Devices for exchanging and storing data; Data processors; Data processing and computer apparatus; Computer hardware; Peripherals adapted for use with computers; Smart cards; Computer software; Apparatus for measuring telematics and telephony traffic, for measuring the quality, the transmission and security thereof; Computers and software for use in telecommunications analysis; Devices (computer programs) for controlling access to one or several computer networks, in particular for securing access to local networks; Devices (computer programs) for the protection of communications on telephony, radiotelephony and computer networks, in particular by sealing and encrypting data packets using a chip card; Devices (chip cards) for the protection of communications on telephony, radiotelephony and computer networks, in particular by sealing and encrypting data packets; Software for computer security, computer programming, software for image analysis and for digital processing of images; computer software for database management in the field of cryptographic network security, website security and data security; Software for automating a process for authentication of identity using existing databases in connection with the issue and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic communication or transaction, over the internet and other computer networks; Encryption software enabling the secure transmission of digital information; Computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; Computer software for use in analysis and reporting of firewall log data; Software for detecting, blocking, and intercepting malware and other threats to computer software and hardware; Software for detecting, preventing, diagnosing, and repairing computer security breaches; computer maintenance software; Software for the collection, compression, verification, measuring, conversion, processing, transfer, safeguarding, storage, restoration and recovery of data; Software for encrypting and decrypting digital files, including audio, video, text, binary, still image, graphics and multimedia files; computer software for identity security; computer software for authentication and identity management information security; computer software for digital information and data access; Software and firmware for the management, transmission and storage of data and information; computer software for use in networking computers; computer software for use in monitoring computers and websites for security purposes; Computer software for use in accessing databases; computer software for use in vulnerability scanning of networks and websites